Versafe’s Real Time Anti-Fraud Technology & Services

Download Report

Transcript Versafe’s Real Time Anti-Fraud Technology & Services

• HQ in Israel
• Threat research, security operations center 24/7.
• In-depth understanding and insight into how ‘cyber crime’ works.
• Over 10 million online identities are already protected.
The risk outside the organization walls
Employees
Anti Virus
IPS
Firewall
SSL VPN,
Webmail,..
Online
Services
Hacker
Customers
The Risk
Online fraud prevention focusing on Identity Protection and
Transaction Integrity.
Completely clienteles while solving problems like MITB, MITM
identifying infected end-user machines, Phishing attacks set-up (!),
Pharming attacks – and all in REAL-TIME.
Bottom line: ZERO impact on user experience, MINIMAL
implementation and very comprehensive fraud PROTECTION.
Versafe solution is implemented in various environments, such as
eBanking, insurance, Gaming and ecommerce.
Versafe Solution Architecture
vScan
vCrime
vDomain
vHTML
vTrack
vSpam
vTrojan
vToken
vCrypt
vSocial
vMonitor
vCert
Organization
Web Application
vMobile
vSpy
Versafe Cloud
vPharming
vSOC
vTrojan
--Security
Detection
& Analysis
& Forensics
vToken
Automatic
Malicious
Activity
vSOC
Operation
Center
vMobile
Secure
Web
&
Native
Mobile
vSPAM
vSocial
---Man
Spam
Monitoring
Collection
Fraud
And
In
Social
Spam
vDomain
vHTML
HTML
Detection
Modification
Similar
Domains
Detection
vScan
vCert
vTrack
Scanning
Website
In
The
For
Middle
Similar
Copy
Detection
Detection
Website
vCrypt
Applaication
Layer
Encryption
vPharming
DNS
hijacking
&
Trojan,
C&C,
DropZone,
Malicious
Script,
vCrime
-Takedown
Intelligence
vMonitor
-CyberCrime
Monitoring
Old
Fraud
vSpy
- Monitoring
Hacker
Communities
Detection
Analysis
&
Fraud,
Phishing,
Application
Networks
Analysis
Configuration
Files,
Mule Accounts And
MITM
Intelligence
Trojan
&
Pharming
Credential Recovery
vAlert System
Phishing
Pharming
How long does it take to detect a Phishing site?




When did the phishing site go on the air?
Who is the attacker?
How many victims?
Who are these victims?
Faster response, shorter up times






Real time alerts
Take down of fraud sites within four hours of detection
Blacklisting on browsers
Disinformation of the attacker
Detection of affected users
Collecting forensic information
Versafe enables the immediate detection of a
Phishing attack.
Versafe provides the organization with useful information:
 Instant detection of phishing site setup
 The attacker’s IP
 Number of victims that logged into the phony site
 Usernames and IP’s of victims
 Fast take down of the phishing site
Phishing
Trojans
Pharming
Trojans – what needs to be asked
How can I neutralize end-users’ Trojans
transparently?




Who are my infected users?
What can I do once I found out a user is infected?
How do I prevent a Trojan from stealing my customers
credentials?
How can I protect the customers from automatic
transactions?
Prevention, damage mitigation, identification of an infected PC





vCrypt - Encryption in the application layer
vHTML - Detect Malicious Code Injection in the client side
vHTML - Detect Infected Computers
Advanced Virtual Keyboard (Anti key loggers, Anti screenshot and Anti click position)
vToken - Transaction & Authentication Integrity (Encryption, Verification
and Automation)

Trojan Intelligence

Automatic scanning & collecting for:

Dedicated Trojans
 Malicious Command & Control (C&C)
 Mule Accounts
Malware DNS/Servers Monitoring
Information collecting from hacker communities
Malware honeypots technologies
Collect Partners Feeds





User Credentials in Trojan Drop Zones
Versafe neutralizes the effects of Trojans
transparently
Versafe provides the organization with useful
information:
 Infected users are reported to the organization
 There is no need for intervention by the user
 Advanced encryption disables Trojan functionality
 There is no need for compliance or cooperation by
the user
Phishing
Pharming
Trojans
How many users connect to the organization
over a tapped network connection?




Who are these users?
Where have they logged in from?
Who is the attacker?
How do I prevent a “Pharmer” harvesting useful data?
Versafe enables the organization to know of each user
that logs in from an unsecure location, in real time.
Versafe provides the organization with useful
information:
 Identities of Pharming victims
 Location and IP of compromised router
 IP of the attacker
 Advanced encryption renders harvested data
useless
Native Applications
Components
Web Application
Components
Java for Android
C Objective for iPhone
Malware detection
Malware detection
Application level
encryption
Certificate checks
Application level
encryption
Pharming detection
Phishing detection
Virtual keyboard
Virtual keyboard
Versafe protects your customers & employees
Anti Virus
IPS
Firewall
Employees
SSL VPN,
Webmail,..
Online
Services
Hacker
Customers

Enables organizations to become proactive, faster

Fast implementation on the organization’s websites

No installation of software on the end user side

Real time detection of identity theft

Supply the organization with critical information

Neutralize identity theft by Phishing, Trojans and Pharming
E [email protected]
T +972-3-9622655 #104
F +972-3-9511433